Best Practices for Business-Driven Identity & Access Management
- LANGUAGE: English DATE: Tuesday, November 06, 2012 TIME: 16:00 CET, 10am EST
Social Computing, Mobile Computing and the Cloud are challenging your enterprise´s security strategy and create the need for a new look at IAM. In this webinar, Martin Kuppinger (KuppingerCole) and Deepak Taneja (Aveksa) will talk about the changing requirements for Identity and Access Management in global organizations.
As they face more security threats and regulatory challenges than ever, enterprises today are implementing Identity & Access Management (IAM) solutions built around business context. By doing so, companies can empower line of business owners to take ownership of identity and access control, and provide full business context across Identity and Access Management systems. The end result is greater business and IT alignment, reduced risk of security breaches, increased compliance assurance and significantly lower total cost of ownership for IAM initiatives.
Join KuppingerCole Pricipal Analyst Martin Kuppinger, and Deepak Taneja, Chief Technology Officer for Aveksa, as they explore past and future approaches to Identity Management, recommend approaches that have been successful for global organizations, and provide best practices for a business-driven approach to Identity and Access Management.
Aveksa was founded by a team of identity and access management pioneers, whose successful track records include Netegrity, Banyan Systems and PowerSoft. They recognized that businesses are struggling to achieve security governance across the enterprise, and are unable to efficiently or effectively manage the risk of inappropriate access to enterprise information resources.
From the time of our founding, we’ve focused on helping security teams and business managers collaborate on these objectives, through the automation of the many critical, yet manual tasks associated with access delivery, change management and compliance across the entire enterprise. We believe that in order to rapidly respond to business and regulatory demands, IT security organizations need an Enterprise Access Governance solution, to manage the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation.
We provide the industry's most comprehensive, enterprise-class, access governance and management solution, helping IT organizations reduce access management complexity and increase operational efficiency, while minimizing risk and ensuring sustainable compliance. Leading Global 2000 organizations in financial services, healthcare, retail, energy/utility, telecommunications, transportation and manufacturing rely on Aveksa to efficiently address access request, fulfillment and regulatory compliance demands.
Since 2006, when we released the first version of our product, we’ve been working hard to make our vision a reality. Our Enterprise Access Governance solutions are distinct in the following ways:
- We make line-of-business managers key participants in access governance
- We support ALL enterprise entitlements and roles; and enable role-based governance
- We provide reports, certifications and analytics that are easily understood by business users
- We enable and track entitlement changes
- Our solutions are designed for fast deployment and massive scale
- We embrace, complement and integrate with identity management and change management systems
- Aveksa's growing customer base includes leading organizations in financial services, health care and manufacturing. Our customers tell us that “we get it.” We think you will too
Continuing Education Credits
After attending this webinar you will be able to:
- Understand the changing requirements for Identity and Access Management solutions in global organizations.
- Describe how to let the business take ownership of identity and access control.
- Evaluate the advantages of a greater business and IT alignment.
This event qualifies for 1 Group Internet Based CPE
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: email@example.com
Digitalization evolves with the increased use of microcomputers in everyday objects like cars and smart fridges, but also in industrial applications. Therefore, communication between devices is growing accordingly. While connecting devices is supposed to make our lives easier, it poses a great challenge from a security standpoint. Every connection opens a potential backdoor for attackers to slip inside your network.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
KuppingerCole analysts build upon competencies from comprehensive research, experience from highly topical PAM advisory projects and systematically expanded and advanced best practices. Our analysts and advisors offer a one-of-a-kind, multi-channel approach to modern knowledge transfer: the KuppingerCole Master Class Privileged Access Management. Webinars and webcasts, up-to-date research documents, an all-day classroom workshop with final exam and certification of the acquired skills lay the foundation for establishing the necessary technical and methodological knowledge in your own organization.